Comments for Your System – Not Guilty As Chargedhttps://yoursystemnotguiltyascharged.wordpress.com
Just another WordPress.com weblogMon, 15 May 2017 15:31:22 +0000hourly1http://wordpress.com/Comment on Could the world have minimized the ransomware attack on XP? by Joel Schipperhttps://yoursystemnotguiltyascharged.wordpress.com/2017/05/14/could-the-world-have-minimized-the-ransomware-attack-on-xp/#comment-325
Mon, 15 May 2017 15:31:22 +0000http://yoursystemnotguiltyascharged.wordpress.com/?p=955#comment-325A good graphic of ransomware from the CIO Journal column:
]]>Comment on Could the world have minimized the ransomware attack on XP? by Joel Schipperhttps://yoursystemnotguiltyascharged.wordpress.com/2017/05/14/could-the-world-have-minimized-the-ransomware-attack-on-xp/#comment-324
Mon, 15 May 2017 15:29:01 +0000http://yoursystemnotguiltyascharged.wordpress.com/?p=955#comment-324Today (May 15) CIO Journal column in the Wall Street Journal make the point that this may be a “teachable” moment … here’s the column.

The Morning Download: Global Cyberattacks Put Pressure on CISOs, CIOs
By Steve Rosenbush
Good morning. The global cyberattack that erupted on Friday inevitably has put intense pressure on CIOs and CISOs, who are widely responsible for keeping corporate software up to date. The fact that many organizations didn’t keep their software up to date by implementing a Microsoft Corp. patch issued in March made organizations more vulnerable to attack. A researcher in the UK triggered a so-called kill switch that slowed the virus but experts warn that it isn’t entirely dead and that it is likely to keep spreading. (For the latest, see here and here.)

In the event of a crisis, leaders may search for that one throat to choke. One security expert warns that it might be a mistake to start firing such professionals, following a breach. “There are many IT administrators and even CIOs that are concerned that they’re going to lose their jobs for not patching Windows XP, 8, or even still running those OSs. I think there’s a non-intuitive teachable moment here: organizations should not act out the old adage that the CISO’s primary job is to get fired when something goes wrong, in this case,” writes Shuman Ghosemajumder, a Google click-fraud security veteran who is now CTO of Shape Security. “The attack is so widespread that it is an industry-wide wakeup call,” he says.

The attack has been a teachable moment, and now is the time to make the most of those who have benefited from its experience, Mr. Ghosemajumder maintains. “In the context of both security and privacy, I’ve learned that people only learn to be sufficiently paranoid when they have had a bad personal experience. For example, people don’t start taking identity theft seriously until they’ve been the victim of it,” he argues in an email to CIO Journal. “What you have right now is thousands of IT administrators and CIOs that are having one of the worst days of their lives. If you keep them in their job, you are going to have someone who will absolutely learn all of the necessary best practices to avoid something like this in the future.”

]]>Comment on Could the world have minimized the ransomware attack on XP? by Joel Schipperhttps://yoursystemnotguiltyascharged.wordpress.com/2017/05/14/could-the-world-have-minimized-the-ransomware-attack-on-xp/#comment-323
Mon, 15 May 2017 15:21:54 +0000http://yoursystemnotguiltyascharged.wordpress.com/?p=955#comment-323Very helpful guidelines on dealing with Ransomware, courtesy of the IT Team at PCB APPS …

Over 60,000 companies of more than 100 countries have become the victim of this global ransomware malware attack. Here is how ransomware works and some possible solutions.

‘RANSOMWARE’ is a type of malware which gets into your computer and locks down all the files. Afterwards it seeks for money from you in order to get access to the locked files. The recent ransomwares are smarter than ever. It just not only locks down the files, but also encrypts the files which makes it really impossible to crack open the locked files. As a result the users do not have any other way to regain access to their locked files but to pay the money in bitcoin, and get the decryption code.

How does it get into your computer?

The easiest to get into someone’s computer is through attachments of spam emails or by entering into any unknown link. The extension of these files are different than the conventional files. Usually users turn off the file extensions, so they can not know what kind of file they are clicking on. The virus file pretends like a doc file or any other text file. But if you turn on the file extension of your computer you will see that the file extensions are different. As you click on the file all your data start encrypting and eventually asking you for ransom.

The recent ransomware which is causing mass loss is known as #WannaCry. This asks for opening a javascript file in your email in the format (.js). So it is now recommended not to open any unknown attachments sent through emails.

How to recover a ransomware infected computer?

For now there is no way to open the encrypted files. You have to pay through bitcoins in order to get the decryption code.

Please be very vigilant and run through the following checks before replying to an e-mail, clicking on a link or opening an attachment. Take these safety measures :

– Scrutinize the sender id by clicking on ‘Show Details’ in Outlook/Gmail mail: Even if the sender’s name seems fine, check if the e-mail address is correct.

– Look out for obscure mail subject lines that do not concern you or your project and prompts you to open an attachment. e.g. scan_234234, PDF12345. URGENT_21.

– Take time to read the e-mail: Despite noticing a sense of urgency expressed in the subject line, try to recollect if you had received any previous e-mails on this subject.

– Check sender id before replying: Confirm the sender e-mail id and domain before replying to an e-mail.

– Note suspicious attachments or links: Be wary of suspicious attachments that you aren’t expecting or URLs in the e-mail.

– Do suspect that your machine could be infected? Please physically disconnect the network cable or turn off the WiFi and immediately contact IT experts by phone call.

– If you are a laptop user or mobile user, avoid using public WiFi’s that do not require a password, such as free airport WiFi’s.

– Keep your Operating System up to date.

– Keep you Anti-Virus up to date.

– Create back up for the most important files either in a secured hard drive or in a secured cloud storage.

– Do not open any email attachments from unknown senders.

– Be careful while opening and downloading from any unknown third party websites.

In the event that you do receive such a suspicious e-mail, please report it by using the ‘Report Spam’ feature in the e-mail client for further investigation.

]]>Comment on Keeping Cloud SaaS offerings “not guilty” by Joel Schipperhttps://yoursystemnotguiltyascharged.wordpress.com/2017/01/25/keeping-cloud-saas-offerings-not-guilty/#comment-314
Thu, 26 Jan 2017 18:10:50 +0000http://yoursystemnotguiltyascharged.wordpress.com/?p=880#comment-314Thanks Dave … excellent commentary. I’ll pass your thoughts along to my friend as well. I had heard of “customizations” within the SalesForce and Netsuite worlds, but no one to date had been able to explain them as well as you do above. Much appreciated! Joel
]]>Comment on Keeping Cloud SaaS offerings “not guilty” by Dave Loeschhttps://yoursystemnotguiltyascharged.wordpress.com/2017/01/25/keeping-cloud-saas-offerings-not-guilty/#comment-313
Thu, 26 Jan 2017 16:31:55 +0000http://yoursystemnotguiltyascharged.wordpress.com/?p=880#comment-313Of course, these opinions are mine and not my employer’s, but I agree customization has been the bane of the on prem world. However, true SaaS (not the amorphous ‘cloud’) may offer an alternative. When the publisher is ONLY releasing code to a single environment supported by a platform (PaaS) that partners and customers can use to build customizations/extensions from, it is possible to relieve the “original” publisher of all development responsibility. (Experience has taught us that no vendor can get to every request much less build configurations that address every conceivable requirement.) Although there is no such thing as caveat-free customization, you can see ample proof points of successful customization/extensions in ecosystems like NetSuite and Salesforce. Only time will tell if the model is scalable and sustainable, but the returns are thus far promising.
]]>Comment on Keys to Successful Software Selection and Implementation by Joel Schipperhttps://yoursystemnotguiltyascharged.wordpress.com/2016/01/29/keys-to-successful-software-selection-and-implementation/#comment-295
Wed, 03 Feb 2016 16:27:03 +0000http://yoursystemnotguiltyascharged.wordpress.com/?p=611#comment-295Address the real life needs of the customer. A friend who is a former Controller knows what made her life crazy each day at work. And now she starts each software demo by directly addressing those issues, showing precisely how the software will smooth out those daily ups and downs, and provide the metrics and reports that top executives demand each month.
]]>Comment on Keys to Successful Software Selection and Implementation by Joel Schipperhttps://yoursystemnotguiltyascharged.wordpress.com/2016/01/29/keys-to-successful-software-selection-and-implementation/#comment-294
Wed, 03 Feb 2016 16:15:02 +0000http://yoursystemnotguiltyascharged.wordpress.com/?p=611#comment-294Listening to Ed Kubulins talk about successful software sales at the JDE Summit 16 in Denver today. Ed notes that the #1 thing in a software selection is to KNOW YOUR requirements, and make sure the software has functions that MEET YOUR requirements. And with Google, you can easily find the “top 4 things for chemical distribution ERP” or “5 must have reports for distributors,” etc. So in addition to listening to your executive expectations, get ready IN ADVANCE by doing this Google research and be ready to bring those to your ‘executive discovery.’
]]>Comment on Guilty and Not Guilty as Charged – Old Releases by Joel Schipperhttps://yoursystemnotguiltyascharged.wordpress.com/2015/01/10/guilty-and-not-guilty-as-charged-old-releases/#comment-274
Tue, 17 Feb 2015 18:04:44 +0000http://yoursystemnotguiltyascharged.wordpress.com/?p=570#comment-274Thanks – I’ll remember that link
]]>Comment on Guilty and Not Guilty as Charged – Old Releases by Kathleenhttps://yoursystemnotguiltyascharged.wordpress.com/2015/01/10/guilty-and-not-guilty-as-charged-old-releases/#comment-273
Fri, 13 Feb 2015 23:42:03 +0000http://yoursystemnotguiltyascharged.wordpress.com/?p=570#comment-273Want to copy articles from other blogs rewrite
them in seconds and post on your site, or use for contextual backlinks?
You can save a lot of writing work, just type in google: